[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures

Published: 03 February 2021 Publication History

Abstract

The increase in cybersecurity threats and the challenges for organisations to protect their information technology assets has made adherence to organisational security control processes and procedures a critical issue that needs to be adequately addressed. Drawing insight from organisational theory literature, we develop a multi-theory model, combining the elements of the theory of planned behaviour, competing value framework, and technology—organisational and environmental theory to examine how the organisational mechanisms interact with espoused cultural values and employee cognitive belief to influence cybersecurity control procedures. Using a structured questionnaire, we deployed structural equation modelling (SEM) to analyse the survey data obtained from public sector information technology organisations in Nigeria to test the hypothesis on the relationship of socio-organisational mechanisms and techno-cultural factors with other key determinants of employee security behaviour. The results showed that knowledge of cybersecurity and employee cognitive belief significantly influence the employees’ intentions to comply with organisational cybersecurity control mechanisms. The research further noted that the influence of organisational elements such as leadership on employee security behaviour is mediated by espoused cultural values while the impact of employee cognitive belief is moderated by security technologies. For effective cybersecurity compliance, leaders and policymakers are therefore to promote organisational security initiatives that ensure incorporation of cybersecurity principles and practices into job descriptions, routines, and processes. This study contributes to behavioural security research by highlighting the critical role of leadership and cultural values in fostering organisational adherence to prescribed security control mechanisms.

References

[1]
Icek Ajzen. 2005. Attitudes, Personality, and Behavior. McGraw--Hill Education (UK).
[2]
Bernard M. Bass and Bruce J. Avolio. 1993. Transformational leadership and organizational culture. Public Administration Quarterly 17, 1 (1993), 112--121.
[3]
Daniel Bell. 1999. The axial age of technology foreword: 1999. The Coming of the Post-industrial Society (1999), ix--lxxxv.
[4]
Rebecca Bryant. 2001. What kind of space is cyberspace. Minerva-An Internet Journal of Philosophy 5, 2001 (2001), 138--1.
[5]
Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quart. 34, 3 (2010), 523--548.
[6]
Edward G. Carmines and Richard A. Zeller. 1979. Reliability and Validity Assessment. Vol. 17. Sage.
[7]
Shuchih Ernest Chang and Chin-Shien Lin. 2007. Exploring organizational culture for information security management. Industrial Management 8 Data Systems 107 (2007), 438--458.
[8]
William R. Claycomb, Carly L. Huth, Lori Flynn, David M. McIntire, Todd B. Lewellen, and CERT Insider Threat Center. 2012. Chronological examination of insider threat sabotage: Preliminary observations. J. Wirel. Mob. Netw. Ubiq. Comput. Depend. Appl. 3, 4 (2012), 4--20.
[9]
Sheldon Cohen, Tom Kamarck, and Robin Mermelstein. 1983. A global measure of perceived stress. Journal of Health and Social Behavior 24, 4 (1983), 385--396.
[10]
A. Yuryna Connolly, M. Lang, J Gathegi, and D. J. Tygar. 2017. Organisational Culture, Procedural Countermeasures, and Employee Security Behaviour: A Qualitative Study. Information and Computer Security 25, 2 (2017), 118--136.
[11]
Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, and Richard Baskerville. 2013. Future directions for behavioral information security research. Comput. Secur. 32 (2013), 90--101.
[12]
Critical Infrastructure Cybersecurity. 2014. Framework for improving critical infrastructure cybersecurity. Framework 1, 11 (2014).
[13]
Adéle Da Veiga. 2016. A cybersecurity culture research philosophy and approach to develop a valid and reliable measuring instrument. In Proceedings of the 2016 SAI Computing Conference (SAI). IEEE, 1006--1015.
[14]
Adéle Da Veiga and Jan H. P. Eloff. 2010. A framework and assessment instrument for information security culture. Comput. Secur. 29, 2 (2010), 196--207.
[15]
John D’Arcy, Anat Hovav, and Dennis Galletta. 2009. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Inf. Syst. Res. 20, 1 (2009), 79--98.
[16]
Thomas H. Davenport, Laurence Prusak, et al. 1998. Working Knowledge: How Organizations Manage What They Know. Harvard Business Press.
[17]
Ronald J. Deibert and Rafal Rohozinski. 2010. Risking security: Policies and paradoxes of cyberspace security. Int. Pol. Sociol. 4, 1 (2010), 15--32.
[18]
Rocco Depietro, Edith Wiarda, and Mitchell Fleischer. 1990. The context for change: Organization, technology and environment. Process. Technol. Innov. 199, 0 (1990), 151--175.
[19]
Tamara Dinev and Qing Hu. 2007. The centrality of awareness in the formation of user behavioral intention toward protective information technologies. J. Assoc. Inf. Syst. 8, 7 (2007), 23.
[20]
Waldo Rocha Flores, Egil Antonsen, and Mathias Ekstedt. 2014. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Comput. Secur. 43 (2014), 90--110.
[21]
Claes Fornell and David F. Larcker. 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Market. Res. 18, 1 (1981), 39--50.
[22]
Bill Gates. 1999. Business@ the speed of thought. Bus. Strat. Rev. 10, 2 (1999), 11--18.
[23]
Asghar Ghasemi and Saleh Zahediasl. 2012. Normality tests for statistical analysis: A guide for non-statisticians. Int. J. Endocrinol. Metab. 10, 2 (2012), 486.
[24]
Rebecca A. Grier. 2012. Military cognitive readiness at the operational and strategic levels: A theoretical model for measurement development. J. Cogn. Eng. Decis. Mak. 6, 4 (2012), 358--392.
[25]
Nadine Guhr, Benedikt Lebek, and Michael H. Breitner. 2019. The impact of leadership on employees’ intended information security behaviour: An examination of the full-range leadership theory. Inf. Syst. J. 29, 2 (2019), 340--362.
[26]
Joshua J. Guyer, Leandre R. Fabrigar, Thomas I. Vaughan-Johnston, and Clement Tang. 2018. The counterintuitive influence of vocal affect on the efficacy of affectively-based persuasive messages. Journal of Experimental Social Psychology 74 (2018).
[27]
Joe F. Hair Jr, Marko Sarstedt, Lucas Hopkins, and Volker G. Kuppelwieser. 2014. Partial least squares structural equation modeling (PLS-SEM). Eur. Bus. Rev. (2014).
[28]
Tejaswini Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur, and H. Raghav Rao. 2014. Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Inf. Syst. J. 24, 1 (2014), 61--84.
[29]
Tejaswini Herath and H. Raghav Rao. 2009. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Supp. Syst. 47, 2 (2009), 154--165.
[30]
Dirk Hovorka and Kai Larsen. 2017. Modes of theory integration. In Proceedings of the 50th Hawaii International Conference on System Sciences.
[31]
Qing Hu, Tamara Dinev, Paul Hart, and Donna Cooke. 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decis. Sci. 43, 4 (2012), 615--660.
[32]
John Hulland. 1999. Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strateg. Manage. J. 20, 2 (1999), 195--204.
[33]
Norshima Humaidi and Vimala Balakrishnan. 2013. Exploratory factor analysis of user’s compliance behaviour towards health information system’s security. J. Health Med. Inf. 4, 2 (2013), 2--9.
[34]
Norshima Humaidi and Vimala Balakrishnan. 2018. Indirect effect of management support on users’ compliance behaviour towards information security policies. Health Inf. Manage. J. 47, 1 (2018), 17--27.
[35]
Princely Ifinedo. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31, 1 (2012), 83--95.
[36]
Alexandros Kaliontzoglou, Panagiotis Sklavos, Thanos Karantjias, and Despina Polemi. 2005. A secure e-Government platform architecture for small to medium sized public organizations. Electr. Comm. Res. Appl. 4, 2 (2005), 174--186.
[37]
Atreyi Kankanhalli, Hock-Hai Teo, Bernard C. Y. Tan, and Kwok-Kee Wei. 2003. An integrative study of information systems security effectiveness. Int. J. Inf. Manage. 23, 2 (2003), 139--154.
[38]
Weiling Ke and Kwok Kee Wei. 2008. Organizational culture and leadership in ERP implementation. Decis. Supp. Syst. 45, 2 (2008), 208--218.
[39]
Bilal Khan, Khaled S. Alghathbar, Syed Irfan Nabi, and Muhammad Khurram Khan. 2011. Effectiveness of information security awareness methods based on psychological theories. Afr. J. Bus. Manage. 5, 26 (2011), 10862--10868.
[40]
Ned Kock. 2009. Information systems theorizing based on evolutionary psychology: An interdisciplinary review and theory integration framework. MIS Quart. (2009), 395--418.
[41]
Ned Kock and Pierre Hadaya. 2018. Minimum sample size estimation in PLS-SEM: The inverse square root and gamma-exponential methods. Inf. Syst. J. 28, 1 (2018), 227--261.
[42]
Hennie A. Kruger and Wayne D. Kearney. 2006. A prototype for assessing information security awareness. Comput. Secur. 25, 4 (2006), 289--296.
[43]
Dorothy E. Leidner and Timothy Kayworth. 2006. A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quart. 30, 2 (2006), 357--399.
[44]
Moez Limayem, Sabine Gabriele Hirt, and Christy M. K. Cheung. 2007. How habit limits the predictive power of intention: The case of information systems continuance. MIS Quart. (2007), 705--737.
[45]
Eric Luiijf, Kim Besseling, and Patrick De Graaf. 2013. Nineteen national cyber security strategies. Int. J. Crit. Infrastruct. 9, 1--2 (2013), 3--31.
[46]
Olive Lundy. 1994. From personnel management to strategic human resource management. Int. J. Hum. Resource Manage. 5, 3 (1994), 687--720.
[47]
Andy Luse, Julie A. Rursch, and Doug Jacobson. 2014. Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major. ACM Trans. Comput. Educ. 14, 3 (2014), 1--19.
[48]
Emily Matta. 2018. Kansans at risk: Strengthened data breach notification laws as a deterrent to reckless data storage. U. Kan. L. Rev. 67 (2018), 823.
[49]
David C. McClelland and Richard E. Boyatzis. 1982. Leadership motive pattern and long-term success in management. J. Appl. Psychol. 67, 6 (1982), 737.
[50]
SP NIST. 1998. 800-16 (1998). National Institute of Standards and Technology (NIST) Information Technology Training Requirements: A Role-and Performance-based Model (NIST Special Publication 800-16). US Department of Commerce, Washington, DC.
[51]
Ikujiro Nonaka and Hirotaka Takeuchi. 1995. The Knowledge-creating Company: How Japanese Companies Create the Dynamics of Innovation. Oxford University Press.
[52]
Peter G. Northouse. 2019. Introduction to Leadership: Concepts and Practice. SAGE.
[53]
Aristotle Onumo, Andrea Cullen, and Irfan Ullah-Awan. 2017. An empirical study of cultural dimensions and cybersecurity development. In Proceedings of the2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud’17). IEEE, 70--76.
[54]
Kathryn Marie Parsons, Elise Young, Marcus Antanas Butavicius, Agata McCormac, Malcolm Robert Pattinson, and Cate Jerram. 2015. The influence of organizational information security culture on information security decision making. J. Cogn. Eng. Decis. Mak. 9, 2 (2015), 117--129.
[55]
Kristopher J. Preacher and Andrew F. Hayes. 2004. SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behav. Res. Methods Instrum. Comput. 36, 4 (2004), 717--731.
[56]
Petri Puhakainen and Mikko Siponen. 2010. Improving employees’ compliance through information systems security training: An action research study. MIS Quart. (2010), 757--778.
[57]
Robert E. Quinn and John Rohrbaugh. 1983. A spatial model of effectiveness criteria: Towards a competing values approach to organizational analysis. Manage. Sci. 29, 3 (1983), 363--377.
[58]
Boumediene Ramdani, Delroy Chevers, and Densil A. Williams. 2013. SMEs’ adoption of enterprise applications: A technology-organisation-environment model. J. Small Bus. Enterpr. Dev. 20, 4 (2013), 735--753.
[59]
Alfonso Reyes and Roberto Zarama. 1998. The process of embodying distinctions—A re-construction of the process of learning. Cybernet. Hum. Know. 5, 3 (1998), 19--33.
[60]
Christian M. Ringle, Sven Wende, Jan-Michael Becker, et al. 2015. SmartPLS 3. Boenningstedt: SmartPLS GmbH (2015).
[61]
Stephen P. Robbins. 2009. Organisational Behaviour in Southern Africa. Pearson South Africa.
[62]
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw Von Solms, Steven Furnell, Norjihan Abdul Ghani, and Tutut Herawan. 2015. Information security conscious care behaviour formation in organizations. Comput. Secur. 53 (2015), 65--78.
[63]
Marko Sarstedt, Christian M. Ringle, Jörg Henseler, and Joseph F. Hair. 2014. On the emancipation of PLS-SEM: A commentary on Rigdon (2012). Long Range Plan. 47, 3 (2014), 154--160.
[64]
Edgar H. Schein. 2004. Organizational Culture and Leadership (Jossey-Bass Business 8 Management Series). Jossey Bass Incorporated.
[65]
Thomas Schlienger and Stephanie Teufel. 2003. Information security culture-from analysis to change. South Afr. Comput. J. 2003, 31 (2003), 46--52.
[66]
STANDARDIZATION SECTOR and OF ITU. 2012. Series y: Global information infrastructure, internet protocol aspects and next-generationnetworks next generation networks--frameworks and functional architecture models. International Telecommunication Union, Geneva, Switzerland, Recommendation ITU-T Y2060.
[67]
Albert H. Segars and Varun Grover. 1999. Profiles of strategic information systems planning. Inf. Syst. Res. 10, 3 (1999), 199--232.
[68]
Samuel Sanford Shapiro and Martin B. Wilk. 1965. An analysis of variance test for normality (complete samples). Biometrika 52, 3/4 (1965), 591--611.
[69]
Mikko Siponen, M. Adam Mahmood, and Seppo Pahnila. 2014. Employees’ adherence to information security policies: An exploratory field study. Inf. Manage. 51, 2 (2014), 217--224.
[70]
Mikko Siponen and Anthony Vance. 2010. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quart. (2010), 487--502.
[71]
Mikko Siponen and Anthony Vance. 2010. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quart. (2010), 487--502.
[72]
Diana K. Smetters and Rebecca E. Grinter. 2002. Moving from the design of usable security technologies to the design of useful secure applications. In Proceedings of the 2002 Workshop on New Security Paradigms. 82--89.
[73]
Linda Smircich. 1983. Concepts of culture and organizational analysis. Admin. Sci. Quart. (1983), 339--358.
[74]
Detmar W. Straub Jr. 1990. Effective IS security: An empirical study. Inf. Syst. Res. 1, 3 (1990), 255--276.
[75]
Shuhaili Talib, Nathan L. Clarke, and Steven M. Furnell. 2013. Establishing a personalized information security culture. In Contemporary Challenges and Solutions for Mobile and Multimedia Technologies. IGI Global, 53--69.
[76]
Michel Tenenhaus, Vincenzo Esposito Vinzi, Yves-Marie Chatelin, and Carlo Lauro. 2005. PLS path modeling. Comput. Stat. Data Anal. 48, 1 (2005), 159--205.
[77]
Ioanna Topa and Maria Karyda. 2015. Identifying factors that influence employees’ security behavior for enhancing ISP compliance. In Proceedings of the International Conference on Trust and Privacy in Digital Business. Springer, 169--179.
[78]
Haridimos Tsoukas and Efi Vladimirou. 2001. What is organizational knowledge? J. Manage. Stud. 38, 7 (2001), 973--993.
[79]
Tom R. Tyler and Steven L. Blader. 2005. Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings. Acad. Manage. J. 48, 6 (2005), 1143--1158.
[80]
Nils Urbach, Frederik Ahlemann, et al. 2010. Structural equation modeling in information systems research using partial least squares. J. Inf. Technol. Theory Appl. 11, 2 (2010), 5--40.
[81]
Jaap J. Van Muijen. 1999. Organizational culture: The focus questionnaire. Eur. J. Work Organiz. Psychol. 8, 4 (1999), 551--568.
[82]
Anthony Vance, Mikko Siponen, and Seppo Pahnila. 2012. Motivating IS security compliance: Insights from habit and protection motivation theory. Inf. Manage. 49, 3--4 (2012), 190--198.
[83]
H. S. Venter and Jan H. P. Eloff. 2003. A taxonomy for information security technologies. Comput. Secur. 22, 4 (2003), 299--307.
[84]
Rossouw Von Solms and Johan Van Niekerk. 2013. From information security to cyber security. Comput. Secur. 38 (2013), 97--102.
[85]
Kenneth Wallston. 2001. Control Beliefs: Health Perspectives. 2724--2726. https://doi.org/10.1016/B0-08-043076-7/03799-2
[86]
Fang Zhao, Alan Collier, and Hepu Deng. 2014. A multidimensional and integrative approach to study global digital divide and e-government development. Information Technology 8 People 27, 1 (2014), 38--62.

Cited By

View all
  • (2025)Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographicsComputer Standards & Interfaces10.1016/j.csi.2024.10392492(103924)Online publication date: Mar-2025
  • (2024)Assessing Employee Susceptibility to Cybersecurity RisksInternational Journal of Information Security and Privacy10.4018/IJISP.35941218:1(1-25)Online publication date: 15-Oct-2024
  • (2024)Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution EraSage Open10.1177/2158244024122892014:1Online publication date: 16-Feb-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Management Information Systems
ACM Transactions on Management Information Systems  Volume 12, Issue 2
June 2021
227 pages
ISSN:2158-656X
EISSN:2158-6578
DOI:10.1145/3446838
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 February 2021
Accepted: 01 September 2020
Revised: 01 April 2020
Received: 01 June 2019
Published in TMIS Volume 12, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cybersecurity
  2. compliance
  3. organisational culture
  4. structural equation modelling

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • National Information Technology Development Agency, Nigeria for sponsoring this programme

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)283
  • Downloads (Last 6 weeks)25
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographicsComputer Standards & Interfaces10.1016/j.csi.2024.10392492(103924)Online publication date: Mar-2025
  • (2024)Assessing Employee Susceptibility to Cybersecurity RisksInternational Journal of Information Security and Privacy10.4018/IJISP.35941218:1(1-25)Online publication date: 15-Oct-2024
  • (2024)Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution EraSage Open10.1177/2158244024122892014:1Online publication date: 16-Feb-2024
  • (2024)Building a thematic framework of cybersecurity: a systematic literature review approachJournal of Systems and Information Technology10.1108/JSIT-07-2023-013226:2(234-256)Online publication date: 10-Apr-2024
  • (2024)Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified FrameworkJournal of Organizational Computing and Electronic Commerce10.1080/10919392.2024.238130334:4(338-369)Online publication date: 24-Jul-2024
  • (2024)Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science ApproachJournal of Management Information Systems10.1080/07421222.2023.230117841:1(236-265)Online publication date: 19-Feb-2024
  • (2024)VISTAInformation and Management10.1016/j.im.2023.10387761:1Online publication date: 14-Mar-2024
  • (2024)Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysisInternational Journal of Information Security10.1007/s10207-024-00859-323:4(2515-2530)Online publication date: 1-Aug-2024
  • (2024)Impact of Institutional Support on First-Year Undergraduate Students’ Cybersecurity Compliance BehaviourProceedings of Ninth International Congress on Information and Communication Technology10.1007/978-981-97-3562-4_1(1-21)Online publication date: 27-Jul-2024
  • (2023)Bibliometrics Study of Organizational CybersecurityEmerging Technologies and Digital Transformation in the Manufacturing Industry10.4018/978-1-6684-8088-5.ch008(115-139)Online publication date: 7-Sep-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media